NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
An Analytical Model for Inference Attacks on the Incumbent's Frequency in Spectrum Sharing
Published
Author(s)
Azza Ben Mosbah, Timothy Hall, Michael R. Souryal, Hossam Afifi
Abstract
In spectrum sharing, incumbents with sensitive parameters require full protection of their operations. The incumbent's protection includes the protection of its privacy (e.g., operational frequency) against inference attacks carried out by malicious authorized secondary users. In this paper, we develop an analytical model to analyze the vulnerability of the incumbent's frequency to inference attacks and validate it by simulation. Specifically, we study random and ordered channel assignment schemes and compare results for both schemes.
Ben Mosbah, A.
, Hall, T.
, Souryal, M.
and Afifi, H.
(2017),
An Analytical Model for Inference Attacks on the Incumbent's Frequency in Spectrum Sharing, IEEE Dynamic Spectrum Access Networks (DySPAN) Conference, Piscataway, NJ, US, [online], https://doi.org/10.1109/DySPAN.2017.7920770, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=922777
(Accessed October 8, 2025)